期刊文献+

SQL自动注入攻击框架研究与设计 被引量:1

Research and Design of Framework to SQL Automatic Injection Attack
下载PDF
导出
摘要 针对目前SQL注入攻击检测手段单一化,不能做网站全面自动分析的问题,构建一种SQL注入的自动化检测框架。在分析SQL注入的基本原理及常见攻击方式基础上,设计了自动注入攻击工具总体框架,以及2条识别和抓取目标Web系统的链接。测试结果表明:该工具能够自动扫描识别2种以上类型的SQL注入攻击,并可对数据库进行攻击检测。该工具还可以进行进一步拓展,以满足灵活的SQL注入变形攻击的需求。 The detection mean of SQL injection attack is single and it can't carry out website automatic analysis, establish SQL injection automatic detection framework. Based on analyzing SQL injection basic principle and attack means, design automatic attack injection tool general framework, and 2 diagnosis and catching target Web system linkages. The test results show that the tool can automatically scanning more than 2 SQL injection attack types, then carry out attack detection for database. The tool can be further expanding for requirements of SQL flexible injection deformation attack.
出处 《兵工自动化》 2015年第8期45-48,共4页 Ordnance Industry Automation
关键词 SQL注入 安全性 攻击 自动检测 SQL injection security attack automatic detection
  • 相关文献

参考文献9

  • 1Victor Chapela.Advanced SQL lnjection[EB/OL], www. owasp, org/index, php/Image:Advanced SQL Injection. ppt.
  • 2TinKode. MySQL. coln Victim of SQL Injection Attack[C/OL]. http://www.acunetix.com/blog/web- security-zone/articles/mysql-com-victim-of-sql-inj ection/, 2011.
  • 3James C. Foster Mike Price.安全编程修炼之道[M].邓劲生,译.北京:清华大学出版社,2006:56.
  • 4Macro Ivaldi[EB/OL]. http://www.Oxdeadbeef.info/exploits/.
  • 5Chen Xueping. SQL injection attack and guard technical research[R]. Procedia Engineering, 2011.
  • 6Indrani Balasundaram, Ramaraj E. An Authentication Mechanism to prevent SQL Injection Attacks[R]. 2011.
  • 7赵文龙,朱俊虎,王清贤.SQL Injection分析与防范[J].计算机工程与设计,2006,27(2):300-302. 被引量:8
  • 8陈小兵,张汉煜,骆力明,黄河.SQL注入攻击及其防范检测技术研究[J].计算机工程与应用,2007,43(11):150-152. 被引量:72
  • 9余静,高丰,徐良华,朱鲁华.基于SQL注入的渗透性测试技术研究[J].计算机工程与设计,2007,28(15):3577-3579. 被引量:8

二级参考文献26

  • 1张勇,李力,薛倩.Web环境下SQL注入攻击的检测与防御[J].现代电子技术,2004,27(15):103-105. 被引量:55
  • 2陈运栋.谈Sql注入式攻击的典型手法和检测防范措施[J].微型电脑应用,2004,20(9):13-15. 被引量:13
  • 3徐陋,姚国祥.SQL注入攻击全面预防办法及其应用[J].微计算机信息,2006,22(03X):10-12. 被引量:40
  • 4JoelScanbray ShemaMike.Web application security secrets and Solutions[M].北京:清华大学出版社,2003..
  • 5Kevin Spett. White paper SQL injection [EB/OL]. 2002.http://www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf.
  • 6Anley Chris.Advanced SQL injection in SQL server applications[EB/OL]. 2003.http://www. nextgenss.com/papers/advanced-sql-injection.pdf.
  • 7Zou Cliff C,Don Towsley, Gong Weibo.E-mail virus propagation modeling and analysis [EB/OL]. 2003.http://tennis.ecs.umass.edu/-czou/research/emailvirus-techreport.pdf.
  • 8潘志强 岑进锋.黑客攻防编程解析[M].北京:机械工业出版社,2003..
  • 9Maximum Security:A hacker's guide to protecting your internet site and network[M].Macmillan Computer Publishing, 1998.
  • 10McClureScambrayS 杨洪涛.Windows 2000黑客大曝光[M].北京:清华大学出版社,2002..

共引文献81

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部